General Settings

Monitoring: all requests are processed, but none of them are blocked even if an attack is detected.

Block: all requests where an attack was detected are blocked.

To learn more about available configuration options, proceed to the link.

Qrator

Those Wallarm customers plugged in with Qrator traffic filters have the Blocking with Qrator setting. This setting enables automatic malicious requests blocking. The blocking is done with the Qrator IP blacklists. Wallarm transfers to Qrator the data on those IP addresses from which the attacks originated.